Polar-Coded Tensor-Based Unsourced Random Access with Soft Decoding
Abstract
The unsourced random access (URA) has emerged as a viable scheme for supporting the massive machine-type communications (mMTC) in the sixth generation (6G) wireless networks. Notably, the tensor-based URA (TURA), with its inherent tensor structure, stands out by simultaneously enhancing performance and reducing computational complexity for the multi-user separation, especially in mMTC networks with a large numer of active devices. However, current TURA scheme lacks the soft decoder, thus precluding the incorporation of existing advanced coding techniques. In order to fully explore the potential of the TURA, this paper investigates the Polar-coded TURA (PTURA) scheme and develops the corresponding iterative Bayesian receiver with feedback (IBR-FB). Specifically, in the IBR-FB, we propose the Grassmannian modulation-aided Bayesian tensor decomposition (GM-BTD) algorithm under the variational Bayesian learning (VBL) framework, which leverages the property of the Grassmannian modulation to facilitate the convergence of the VBL process, and has the ability to generate the required soft information without the knowledge of the number of active devices. Furthermore, based on the soft information produced by the GM-BTD, we design the soft Grassmannian demodulator in the IBR-FB. Extensive simulation results demonstrate that the proposed PTURA in conjunction with the IBR-FB surpasses the existing state-of-the-art unsourced random access scheme in terms of accuracy and computational complexity.
Index Terms:
TURA, Polar-coded, tensor decomposition, variational Bayesian learning.I Introduction
With the approaching era of the Internet-of-Things (IoT), it is anticipated that the sixth generation (6G) wireless networks will provide massive machine-type communication (mMTC) services, such as sensing, monitoring, and reporting [1, 2, 3]. Generally, the mMTC possesses the characteristics of massive connectivity, sporadic traffic, and small payload, where conventional grant-based random access schemes may lead to excessive signaling overhead, network congestion, and high transmission latency [4, 5, 6, 7, 8]. To overcome these issues, the grant-free random access has been introduced into the mMTC to manage the massive access [9, 10, 11]. Without the need for prior authority in the grant-based random access, the grant-free random access allows the active devices to transmit to the base station (BS) directly, thereby significantly alleviating the aforementioned problems.
Currently, there are two types of grant-free random access schemes, i.e., the sourced random access (SRA) scheme [7, 9, 10, 12, 13, 14] and the unsourced random access (URA) scheme [15, 16, 17, 18, 19, 20, 21, 22]. In the SRA scheme, every device is assigned a unique and non-orthogonal pilot for the purpose of the active user detection (AUD) and the channel estimation (CE). For the mMTC network with a substantial number of devices, maintaining the accuracy of the AUD and the CE necessitates the long pilot sequences, which occupy most of the packet length and lead to the suboptimal utilization of the finite system resources. In contrast, the URA scheme is more promising, where all devices utilize a common codebook instead of being assigned unique pilot sequences. In the URA scheme, the responsibility of the BS is to restore the set of the transmitted messages, irrespective of the identities of the active devices. As the URA scheme does not necessitate the explicit initial access phase, it allows full system scalability in the sense that the system remains unaffected by the total number of devices in the network. These advantages contribute to the improved efficiency and make the URA scheme particularly appropriate for the mMTC network involving a large number of devices.
The initial investigation on the URA is reported in [15], where a random coding bound for the Gaussian multiple access channel (GMAC) is discussed. Following this study, a low-complexity URA scheme based on the combination of compute-and-forward and coding for a binary adder channel is proposed in [16]. Nevertheless, the codebook size in [16] increases exponentially with the messages length, resulting in intolerable decoding complexity. To address this issue, many works have devoted in the low-complexity and efficient URA schemes, primarily falling into three categories: the coded compressed sensing (CCS) URA scheme [17, 18, 19, 20, 21, 22], the two-phase URA scheme [23, 24, 25, 26, 27, 28], and the tensor-based URA (TURA) scheme [29, 30, 31]. In the CCS URA, messages of devices are partitioned into multiple segments for transmission, substantially diminishing the size of the codebook for each segment [17, 18, 19, 20]. In [21], a covariance-based non-Bayesian decoder is proposed for the CCS URA. By jointly devising the inner and outer decoding process, a fully Bayesian decoder is proposed for the CCS URA in [22]. On the other hand, messages of devices in the two-phase URA are bifurcated into two sections, where the first section is encoded by a common compressed sensing (CS) codebook and the rest is encoded by the forward-error-correction (FEC) code with the key parameters conveyed by the first section [23, 24]. The low-density parity-check (LDPC)-coded two-phase URA is developed in [25, 26], and the Polar-coded two-phase URA is introduced in [27]. In [28], the Polar coding and the random spreading modulation are employed for the two-phase URA, leading to the fading spread URA (FASURA).
Different from the CCS URA and the two-phase URA, the TURA is a non-segmented scheme, in which the FEC coded messages of devices are modulated and mapped as tensor symbols for transmission [29]. Under conditions of substantial number of active devices in the mMTC network, the false alarm probability of the CCS URA escalates to intolerable levels due to the limitations imposed by the error detection capability of the parity check bits [20, 21, 22], while the two-phase URA performance is suboptimum due to the pilot collisions [27, 28]. Comparatively, the TURA offers a more compelling solution for scenarios involving a large number of active devices, as the inherent tensor structure in it not only boosts performance but also reduces computational demands for multi-user separation [29, 30, 31, 32]. In [30], the sparse code is introduced into the TURA, resulting in the sparse Kronecker-product (SKP) coding scheme. By employing the Bose–Chaudhuri–Hocquenghem (BCH) code and the Grassmannian modulation for the TURA, the tensor-based modulation (TBM) scheme is proposed in [31].
However, existing practical TURA is prevented from adopting current advanced coding methods due to its lack of the soft decoder, which consequently restricts its effectiveness. To thoroughly explore the potential of the TURA, we investigate the TURA with soft decoding. Our primary contributions are summarized as follows:
-
1.
We propose the Polar-coded TURA (PTURA) scheme. The Polar codes with exceptional error-correcting capabilities for the short messages are utilized. Moreover, the Grassmannian modulation is employed in the PTURA, which ensures the accuracy of the demodulation [31].
-
2.
We propose the iterative Bayesian receiver with feedback (IBR-FB) for the PTURA. During each iteration of the IBR-FB, the proposed Grassmannian modulation-aided Bayesian tensor decomposition (GM-BTD) module provides soft information to the proposed soft Grassmannian demodulator, which generates the log-likelihood ratio (LLR) corresponding to each bit of the Polar codewords. Then, the messages of devices are recovered using the cyclic redundancy checking (CRC)-aided successive cancellation list (SCL) Polar decoder. Subsequently, the recovered valid messages, which satisfies the CRC requirement, are fed back to the GM-BTD module for the next iteration. Simulation results show that the proposed PTURA in conjunction with the IBR-FB exhibits superior performance compared to the existing state-of-the-art URA scheme, especially in scenarios with a substantial number of active devices, while maintaining reduced computational complexity.
-
3.
We propose the GM-BTD algorithm in the IBR-FB. Specifically, the initial step in the IBR-FB is formulated as a tensor decomposition (TD) problem, which includes the canonical polyadic decomposition (CPD) as a special case. The soft decoding of the PTURA requires the TD module capable of generating soft information, which can not be realized by the conventional optimization-based algorithms. To address this issue, we propose the GM-BTD algorithm under the variational Bayesian learning framework, which can generate the required soft information without the need for the number of active devices. Furthermore, the GM-BTD capitalizes on the property of the Grassmannian modulation to facilitate the convergence of the variational Bayesian learning process towards the ground truth values. Simulation results show that the proposed GM-BTD algorithm outperforms the baseline algorithm.
The rest of this paper is organized as follows: Section II introduces the system model. The proposed IBR-FB is provided in section III. In section IV, we elaborate the proposed GM-BTD algorithm. Section V presents extensive simulation results and section VI concludes this paper.
Notations: Except for specially noted, lower and upper bold fronts, and , denote vectors and matrices, respectively; , , and denote the -th row of , the -th column of , and the -th entry of , respectively; , , and denote the absolute value, the norm, and the Frobenius norm, respectively; , , and denote the conjugate, the transpose, and the conjugate transpose, respectively; The statistical expectation is denoted by ; and denote the real part and the imaginary part, respectively; , , and denote the Hadamard product, the Khatri-Rao product, and the outer product, respectively; and denote the real number field and the imaginary number field, respectively; denotes the complex Gaussian distributed vector with the mean and the covariance matrix ; denotes is uniformly ditributed between and ; denotes the trace of ; denotes a set composed of ; denotes a diagonal matrix whose main diagonal consists of the elements of the vector .
II System Model
In the considered mMTC network, a BS equipped with antennas provides service for single-antenna devices concurrently. During a specific time interval, an indeterminate number of devices are active, each of which transmits -bits message directly to the BS without a scheduling process. We assume that all of the active devices transmit synchronously on the common available time-frequency resource elements [20, 21, 22]. The primary responsibility of the BS is to recover the set of the transmitted messages, irrespective of the individual device identities.
II-A Signal Model
Dentoe as the channel of active device . We consider the quasi-static Rayleigh fading channel model, i.e.,
(1) |
where denotes the all-zero vector with the length , and denotes the identity matrix with the dimension . Let denote the Grassmannian symbols of active device , where , and the length satisfies . Then, the tensor signal received at the BS is given by
(2) |
where denotes the set of active devices, the cardinality is unknown to the BS, and is the zero-mean Gaussian-i.i.d. noise tensor with the variance being , which is an unknown variable to the BS. As depicted in Fig. 1, represents the tensor symbol transmitted from active device to the BS, which is obtained from the message of active device through the CRC encoding, the Polar encoding, the Grassmannian modulation, and the tensor map** processes.
![Refer to caption](x1.png)
II-B Proposed PTURA Scheme
The efficacy of current practical TURA is limited due to its suboptimal coding and decoding techniques [31]. We incorporate contemporary advanced coding methodologies into the TURA to fully exploit its performance potential. Specially, given the short packet transmission characteristic intrinsic to mMTC systems, we leverage the Polar coding for its superior error correction capabilities. Additionally, the PTURA employs the Grassmannian modulation, ensuring the accuracy of demodulation. As illustrated in Fig. 1, the PTURA transmitter encompasses the CRC encoder, Polar encoder, Grassmannian modulator, and tensor mapper.
1) CRC Encoder:
The CRC coding, a prevalent error-detection technique in communication transmissions [33], is implemented in the PTURA scheme for verifying the decoding results. In the CRC encoding process, the message is encoded to the CRC codeword .
2) Polar Encoder:
The Polar code demonstrates exceptional error-correcting capability for short messages, and has been selected as the channel code for the control information transmission in contemporary 5G communicaitons [33]. With the Polar encoder, the CRC codeword is encoded to the Polar codeword .
3) Grassmannian Modulation:
The Grassmannian constellation embeds a reference signal into each symbol to identify the subspace and eliminate the phase ambiguity of the symbol, which ensures the accuracy of the demodulation in the TURA [31]. We employ the low-complexity structured Grassmannian modulation in [34], which begins with the segmentation of the message. Based on the segment length , active device partions into parts , where , , and is proportional to to maximize the minimum distance of the Grassmannian symbols, i.e.,
(3) |
Furthermore, is modulated as the Grassmannian sysmbol . The first bits of indicate the position of the reference signal in . The rest bits of are uniformly divided into segments , where . Then, with the Gray-coded pulse amplitude modulation, is mapped as the scalar in
Denote where represents the cumulative distribution function of the standard real Gaussian distribution, and represents the inverse function of . Let
(4) |
Then, the Grassmannian symbol is given by
(5) |
where is the reference signal, and its position is determined by the first bits of .
4) Tensor Mapper:
After the Grassmannian modulation, the Grassmannian symbols from device is mapped to the tensor symbol to be transmitted to the BS.
III Iterative Bayesian Receiver with Feedback
Given the noisy observation , the decoder at the BS is tasked with estimating the transmitted messages set . To this end, we propose the IBR-FB, which consists of the GM-BTD module, the soft Grassmannian demodulator, and the Polar and CRC decoder. As depicted in Fig. 2, within each iteration of the IBR-FB, the processing procedure is as: 1) The GM-BTD generates the soft information about the unrecovered messages, utilizing the received tensor signals and the regenerated Grassmannian symbols corresponding to the currently recovered valid messages. 2) On the basis of the soft information provided by the GM-BTD, the soft Grassmannian demodulation and the Polar decoding, as well as the CRC decoding, are performed sequentially to obtain the newly recovered valid messages satisfying the CRC requirement. 3) The newly and currently recovered valid messages form the recovered valid messages for the next iteration, whose corresponding Grassmannian symbols are fed back to the GM-BTD.
Remark 1.
The proposed IBR-FB differs from the successive interference cancellation (SIC) receiver. Within each iteration of the IBR-FB, only the regenerated Grassmannian symbols corresponding to the currently recovered valid messages are fed back, while the channels corresponding to the currently recovered valid messages continue to be unknown.
![Refer to caption](x2.png)
The remainder of this section provides a detailed description of the processing procedure within one iteration of the IBR-FB.
III-A GM-BTD Module
Denote the set of the active devices that transmit the currently recovered valid messages as , where the cardinality . With the same encoder and modulator described in section II, we regenerate the Grassmannian symbols associated with the currently recovered valid messages, denoted as 111We disregard the false alarms in , which arises from the limited error detection capability of the CRC code.. Then, the signal transmission model can be reformulated as
(6) |
where represents the set of the active devices that transmit the unrecovered messages, and the cardinality is unknown. Estimating the set of the unrecovered Grassmannian symbols based on (6) is a TD problem.
Remark 2.
When is empty, the TD problem degenerates into the conventional CPD problem.
Enabling the soft decoding for the PTURA necessitates the incorporation of the TD module capable of producing soft outputs, which can not be attained by the conventional optimization-based algorithms [35, 36]. To resolve this challenge, we propose the GM-BTD algorithm under the variational Bayesian learning framework [37, 38], which can produce the required soft outputs to cooperate with the PTURA. As shown in Fig. 2, given the inputs and , the GM-BTD algorithm generates the estimation of the unrecovered Grassmannian symbols , and the corresponding estimation error , where , denotes the estimation of , and
(7) |
A comprehensive description of the proposed GM-BTD algorithm will be presented in section IV.
Input: .
Initialize: , .
Output: .
III-B Soft Grassmannian Demodulation
On the basis of and , the soft Grassmannian demodulation is performed to obtain the log-likelihood ratio associated with the unrecovered messages, where the entry is given by
(8) |
where the set includes all the Grassmannian symbols corresponding to the Polar codewords, for which the -th bits are equal to . Building upon the foundations established in [32], an approximated closed-form log-likelihood ratio is given by
(9) |
where the Grassmannian symbol is defined as
(10) |
It is worth noting that corresponds to the result of the maximum likelihood (ML) Grassmannian demodulation:
(11) |
where represents the Grassmannian symbol corresponding to . Denote as the Grassmannian symbol corresponding to . If the -th bit of is equal to 1, then , and is the nearest Grassmannian symbol to with the -th bit in its corresponding Polar codeword being 0. Otherwise, , and is the nearest Grassmannian symbol to with the -th bit in its corresponding Polar codeword being 1. is computed through the low-complexity greedy decoder proposed in [34]222It has been demonstrated that the greedy decoder with the computational complexity being can achieve near-ML performance., based on which is obtained. Following this, the log-likelihood ratio is directly determined by (9).
III-C Polar and CRC Decoder
The Polar decoding and the CRC decoding are performed with the CRC-aided SCL Polar decoder, where the Polar decoder provides a list of candidate messages, and the CRC decoder verifies these messages [39, 40]. With the log-likelihood ratio , the CRC-aided SCL Polar decodor yields the newly recovered valid messages satisfying the CRC requirement.
The newly and currently recovered valid messages form the recovered valid messages of the next iteration, whose corresponding Grassmannian symbols will be fed back to the GM-BTD. Such iterative process continues until the set ceases to change. Finally, the recovered valid messages in the last iteration constitute the estimation of the transmitted messages set . We summarize the proposed IBR-FB in Algorithm 1.
IV The Grassmannian Modulation-Aided Bayesian TD Algorithm
We propose the GM-BTD algorithm under the variational Bayesian learning framework to generate the required soft information, leveraging the property of the Grassmannian modulation to facilitate the convergence of the variational Bayesian learning process. With the inputs and , the GM-BTD outputs the estimation of the unrecovered messages number, the estimation of the unrecovered Grassmannian symbols, and the correspoding estimation error , without the need for the number of active devices.
Due to the intricate relationship between the number of the unrecovered messages and the received tensor signal , directly estimating poses a significant challenge [41, 42]. To address this issue, we consider a predefined set with the cardinality (), which is composed of active devices transmitting the unrecovered messages and inactive devices333The details for ascertaining are provided in section V. Note that represents the number of inactive devices introduced artificially, not the actual number of inactive devices in the network.. Then, we can obtain the estimation of by determining the number of inactive devices in , thus aiding in the construction of the probabilistic model and further facilitating the design of the TD algorithm.
With the set , we can express the signal transmission model (6) more compactly as
(12) |
where the symbol (channel) factor matrix () associated with the set consists of an all-zero submatrix with column of and another submatrix that comprises Grassmannian symbols (channels) corresponding to the unrecovered messages, the symbol (channel) factor matrix () associated with the set consists of regenerated Grassmannian symbols (channels) corresponding to the currently recovered valid messages, and represents the Kruskal operator [36].
IV-A Probabilistic Model
According to the signal transmission model, we can get the likelihood probability distribution as shown in (13).
(13) |
We model the unknown noise precision with the Gamma distribution [37], i.e.,
(14) |
where represents the Gamma function. As no prior information about the noise can be acquired by the BS, we set the hyperparameters and , resulting in an uninformative prior .
The prior of the symbol factor matrix is characterized by a complex discrete distribution associated with the Grassmannian modulation constellation, combined with the inherent sparsity. In order to simplify the joint probability distribution and develop a tractable inference algorithm, we approximate this discrete distribution as a continuous Gaussian distribution, and employ a Gamma distributed precision to capture the inherent sparsity, i.e.,
(15) |
where , and the precision exhibits the Gamma distribution, i.e.,
(16) |
The sparsity of is controled by . For instance, when , the -th column of approaches . It should be noted that the precision is shared by symbol factor matrices to facilitate capturing the joint sparsity. Moreover, since the BS cannot obtain prior information regarding the number of unrecovered messages, we set the hyperparameters and .
As for the channel factor matrix , we adopt an uninformative Gamma distributed precision to capture its inherent sparsity, i.e.,
(17) |
where , and the precision exhibits the Gamma distribution, i.e.,
(18) |
where we set the hyperparameters and .
Since the channel factor matrix does not exhibit the sparsity characteristic, it is prior probability distributioncan be written as
(19) |
(20) |
IV-B Variational Bayesian Learning
Exact Bayesian inference based on (20) necessitates multiple integrations, rendering the process intractable. To takle of this challenge, we resort to the variational Bayesian learning method. In particular, we seek for a tractable distribution to approximate the ground truth joint posterior probability distribution by minimizing the Kullback-Leibler (KL) divergence, i.e.,
(21) |
Subsequently, based on the distribution , the unknown random variables set is estimated using the MMSE criterion, which is given by
(22) |
The KL divergence in (21) achieves the minimum value when . In the absence of any constraints imposed on , , which reverts us to the original intractable posterior probability distribution. A prevalent approach to address this issue is the mean field approximation [43]. In this context, can be factorized as
(23) |
Furthermore, the factorized form in (23) implies the adoption of the iterative block coordinate descent methodology, capable of acquiring a suboptimal solution of (21). Denote as the -th factor in . By fixing the factors , the optimum form of the factor is given by
(24) |
Leveraging (24), is obtained by updating each factor until achieving the convergence. In the remainder of this section, we derive the closed-form iterative rules for each factor.
IV-B1 The Symbol Factor
(25) |
which indicates that is a Gaussian distribution, different rows in are independent of each other, the posterior mean and the corresponding covariance matrix are given by
(26) | |||
(27) |
where represents the posterior mean of , is defined as
(28) |
represents the posterior mean of , represents the posterior covariance matrix of , represents the posterior mean of , is defined as
(29) |
and represents the mode- expansion of and
(30) |
represents the posterior mean of . It is important to highlight that the covariance matrix is dependent on the mode index , not the row index , implying that only a single covariance matrix requires computation for the rows of .
(31) |
IV-B2 The Channel Factor
By applying (24), we can get (31), where is defined as
(32) |
denotes the posterior mean of , and is defined as
(33) |
Hence is a Gaussian distribution, different rows in are independent of each other, the posterior mean and the corresponding covariance matrix are given by
(34) | ||||
(35) |
Notably, the covariance matrix is not influenced by the row index , meaning that computing a single covariance matrix is sufficient for the rows of .
(36) |
IV-B3 The Channel Factor
For the channel factor , we can get (36), where is given by
(37) |
Therefore, is a Gaussian distribution, different rows in are independent of each other, and the posterior mean is given by
(38) |
where is given by
(39) |
IV-B4 The Factor
(40) |
where
(41) |
denotes an all-one vector with the length , and denotes the inner product of and . Then, we can conclude is a Gamma distribution, i.e., , where
(42) | |||
(43) |
Furthermore, the posterior mean of the noise precision is given by
(44) |
IV-B5 The Factor
For the random vector , its posterior probability distribution satisfies
(45) |
where represents the -th column of . Therefore, is a Gamma distribution, and the posterior mean of is given by
(46) |
IV-B6 The Factor
For the random vector , its posterior probability distribution satisfies
(47) |
where represents the -th column of . The posterior mean is given by
(48) |
It is worth noting that the iterative rules derived above are based on the assumption that , exhibits the Gaussian-Gamma prior probability distribution, where the Grassmannian modulation is not considered. We suggest that the constant energy property of the Grassmannian symbols, i.e., , can be utilized to make the factor matrix converge towards the ground truth factor matrix . Dentoe as the modified matrix. After a round of updates in the variational Bayesian learning process, we revise the posterior mean and the posterior covariance matrix of as
(49) | ||||
(50) | ||||
(51) | ||||
(52) |
where represents the assignment operation.
The number of non-zero columns of or in (12) can be interpretated as the number of the unrecovered messages. After the revisions (49)–(52), the estimation is represented by the number of non-zero columns of . We obtain by the energy detection method, i.e., the -th column in is considered as non-zero only if
(53) |
where represents a predefined threshold. Furthermore, in order to expedite the variational Bayesian learning process, the on-the-fly pruning is employed [41]. Specifically, during each iteration, if the energy of any column in drops below the predefined threshold , the corresponding device is pruned from . Consequently, diminishes with the number of iterations, and is the cardinality of upon convergence of the variational Bayesian learning process.
We summarize the proposed GM-BTD algorithm in Algorithm 2.
IV-C Computational Complexity and Convergence Property
The computational complexity of the GM-BTD algorithm is assessed in terms of the number of complex multiplication operations. For each iteration, the computational complexity associated with calculating the relevant variables is summarized in Tab. I. With the proposed pruning method (53), will be reduced to within a few iterations (See section V), such that the computational complexity of the GM-BTD algorithm is of the order .
In each iteration, after fixing other variational distributions, the problem of optimizing a single variational distribution has been proven to be convex and the results derived in section IV-B is its unique solution [43]. Each updating step in the variatioanl Bayesian learning process can be viewed as a block coordinate descent step over the functional space. The variational Bayesian learning process is guaranteed to converge to at least a stationary point of the KL divergence.
Variable | Computational Complexity |
V Numerical Results
V-A Simulation Configurations
We present extensive simulations to validate the effectiveness of the proposed PTURA scheme under the commonly used URA settings: , and [21, 28, 31]. In the PTURA, we employ the CRC encoder and the Polar encoder compliant with the 5G standard [33]. Various configurations of the PTURA are detailed in Tab. II444Parameter selection is performed empirically here. Future investigations will focus on optimizing these parameters to augment the performance.. Within each iteration of the IBR-FB, we adopt the cardinality of the considered set as
(54) |
where the parameter is determined by Mente Carlo simulations 555It is worth noting that . Through Mente Carlo simulations, we ascertain that the sufficiently ensures (i.e., ) without resulting in excessive model intricacy., and denotes the mean of . Besides, the hyperparameters in the GM-BTD algorithm are set as: , , , the threshold , and the iteration termination condition .
With these configurations, typical values of the computational complexity corresponding to the PTURA and the sate-of-the art URA scheme, FASURA [28], are provided in Fig. 3, where we exclude the SIC process of the FASURA and the feedback process of the PTURA for simplification. Upon observation, the PTURA demonstrates a significantly reduced computational complexity in comparison to the FASURA.
![Refer to caption](x3.png)
Scheme | ||||||
3-PTURA | 3 | 107 | 126 | 8 | ||
4-PTURA | 4 | 107 | 126 | 8 | ||
5-PTURA | 5 | 107 | 126 | 8 |
![Refer to caption](x4.png)
![Refer to caption](x5.png)
V-B Performance Metrics
In this paper, the energy per bit to noise power spectral density ratio of the system is given by . Denote the collection of the unrecovered Grassmannian symbols of all segments as , where consists of the unrecovered Grassmannian symbols of segment-. Let . As the dimensions of and may not be the same, we evaluate the TD performance of the GM-BTD in terms of the revised normalized mean square error (RNMSE)666We have eliminated the phase ambiguities in via the reference signals.
(57) |
and the rank estimation error ratio (REER)
(58) |
Besides, the system performance is evaluated in terms of the per-user probability of error (PUPE)
(59) |
and the required when .
![Refer to caption](x6.png)
![Refer to caption](x7.png)
![Refer to caption](x8.png)
![Refer to caption](x9.png)
![Refer to caption](x10.png)
![Refer to caption](x11.png)
V-C Evaluation of the GM-BTD Module
In this section, we consider the case where and , causing the GM-BTD to degenerate into a CPD algorithm. A comparison is made between the GM-BTD and the Bayesian CPD algorithm (BCPD) proposed in [41]. The GM-BTD algorithm and the BCPD algorithm utilize identical initializations, pruning criteria, and iteration termination condition. This ensures that the primary distinction between the GM-BTD and the BCPD algorithm lies in the consideration of Grassmannian modulation within the GM-BTD algorithm.
Fig. 4 investigates the convergence behavior of the GM-BTD algorithm. The points of sharp decrease observed in Fig. 4 correspond to the instances where the pruning operations are executed. It can be observed that, utilizing the dimension reduction criteria (53), the value of the initialized number of unrecovered messages in the GM-BTD will decrease approximately to , i.e., , within a few iterations. Fig. 5 depicts the CPD performance of the GM-BTD algorithm and the BCPD algorithm. With the fixed block length , the more number of segments , the less of the unknown variables need to be estimated in the CPD process, and the larger rank of the supported tensor that can be uniquely decomposed [44, 45]. Such that the CPD performance of both the GM-BTD and the BCPD improve with an augmenting segment number , and this phenomena accentuates increasingly as the number of the unrecovered messages increases. Additionally, both the GM-BTD and the BCPD exhibit a degradation in the CPD performance with the escalation of the noise power and the proliferation of the unrecovered messages. As the revisions (49)–(52) in the GM-BTD enable the variational Bayesian learning process to converge towards the ground truth value, the CPD performance of the GM-BTD algorithm surpasses that of the BCPD algorithm, especially when faced with high noise power and a large number of unrecovered messages.
V-D Evaluation of the Polar and CRC Codes
![Refer to caption](x12.png)
In this section, we clarify the advantages of the proposed coding scheme in the PTURA. The benchmark for comparison is the BCH codes, with parameters prescribed by in [31] (i.e., the active device message of length 96 is encoded to the BCH codeword of length 110.). At the transmitter, we substitute the CRC and Polar codes employed in the PTURA with the BCH code, thereby creating a modified scheme referred to as the BTURA. Concurrently, we propose an iterative Bayesian receiver with feedback (IBR-FB) for the BTURA, leveraging the inherent error detection capabilities of the BCH code.
We compare the performance of the 3-BTURA and the 3-PTURA in Fig. 6, where we adopt the settings and for the 3-BTURA. To provide a comprehensive evaluation of the IBR-FB, we have also included in figure the performance of the Bayesian receiver without feedback (BR), which corresponds to the initial iteration of the IBR-FB. As observed from the results, the PTURA demonstrates superior performance compared to the BTURA, particularly when the number of active devices is substantial. The performance gap between the PTURA and the BTURA stems from the fact that the PTURA takes use of the soft information (i.e., the LLR ) fully. In addition, the IBR-FB performs much better than the BR in both schemes. But we should recognize that the performance improvement of the IBR-FB comes at the cost of higher computational complexity.
![Refer to caption](x13.png)
![Refer to caption](x14.png)
![Refer to caption](x15.png)
V-E Evaluation of the PTURA Scheme
In this section, we delve into the analysis of the system performance of the PTURA under varying parameter configurations. Fig. 7 compares the performance of the 3-PTURA, 4-PTURA, and 5-PTURA. In scenarios with a smaller number of active devices, the performance of the 3-PTURA surpasses that of the 4-PTURA. However, when considering a relatively larger number of active devices, the 4-PTURA demonstrates superior performance compared to the 3-PTURA. The discrepancy between the TD performance and the decoding performance is what causes this phenomenon. Given a fixed block length , the fewer of the number of segments , the higher the freedom of the coding [34], and thus the better the decoding performance. On the other hand, with the fixed block length , the more number of segments, the greater the rank of the supported tensor that can be uniquely decomposed [44, 45], and thus the larger of the supported number of active devices. In scenarios with a small number of active devices, the system performance is primarily determined by decoding performance, whereas in cases with a larger number of active devices, TD performance predominantly influences the system performance. Nonetheless, the reduced coding freedom leads to the 5-PTURA underperforming in comparison to the 4-PTURA, irrespective of whether the number of active devices is small or large. This finding suggests that, when the number of segments is equal to or greater than 4, the PTURA cannot support more active devices by increasing the number of segments. Compared with the PTURA with BR, it is evident that the PTURA with IBR-FB exhibits a substantial enhancement in performance. Moreover, the system performance of the PTURA with IBR-FB experiences a significantly slower decline as the number of active devices escalates.
![Refer to caption](x16.png)
In Fig. 8, we compare the required of the PTURA with IBR-FB, the TBM proposed in [31], and the state-of-the-art URA scheme FASURA [28], when . The proposed PTURA demonstrates a significant performance gain compared to the TBM. Furthermore, it is observed that the proposed 3-PTURA, with considerably less computational complexity (See Fig. 3), outperforms FASURA when the number of active devices exceeds 500. The performance gap between the two schemes widens as increases. For instance, when , the gap between the two schemes amounts to 0.2 dB, and when , the gap extends to more than 3.6 dB. Indeed, the FASURA operates as an TURA scheme with , which grants it greater coding freedom compared to the 3-PTURA. As a result, the FASURA can employ more powerful coding and modulation schemes (e.g., Polar coding with a lower code rate and random spreaing in the FASURA), and the FASURA performs better than the 3-PTURA when . However, this comes at the cost of high computational complexity. Furthermore, when comparing the 3-PTURA and 4-PTURA, a phenomena consistent with the observations in Fig. 7 becomes evident. If , then the 4-PTURA performs better than the 3-PTURA; otherwise, the 3-PTURA is better than the 4-PTURA.
VI Conclusion
In this paper, we investigated the PTURA scheme. The IBR-FB was proposed for the PTURA, relying on the error detection capabilities of the CRC codes. Specifically, under the variational Bayesian learning framework, we proposed the GM-BTD algorithm for exporting the required soft information without the knowledge of the number of active devices. Subsequent to this, we developed the soft Grassmannian demodulator to compute the required LLR. Numerous simulations demonstrated that the proposed PTURA scheme outperforms the existing state-of-the-art unsourced random access scheme.
References
- [1] Y. Wu, X. Gao, S. Zhou, W. Yang, Y. Polyanskiy, and G. Caire, “Massive access for future wireless communication systems,” IEEE Wireless Commun., vol. 27, no. 4, pp. 148–156, Aug. 2020.
- [2] Z. Gao, Z. Wan, D. Zheng, S. Tan, C. Masouros, D. W. K. Ng, and S. Chen, “Integrated sensing and communication with mmwave massive MIMO: A compressed sampling perspective,” IEEE Trans. Wireless Commun., vol. 22, no. 3, pp. 1745–1762, Mar. 2023.
- [3] Z. Gao, M. Wu, C. Hu, F. Gao, G. Wen, D. Zheng, and J. Zhang, “Data-driven deep learning based hybrid beamforming for aerial massive MIMO-OFDM systems with implicit CSI,” IEEE J. Sel. Areas Commun., vol. 40, no. 10, pp. 2894–2913, Oct. 2022.
- [4] L. Liu, E. G. Larsson, W. Yu, P. Popovski, C. Stefanovic, and E. de Carvalho, “Sparse signal processing for grant-free massive connectivity: A future paradigm for random access protocols in the internet of things,” IEEE Signal Process. Mag., vol. 35, no. 5, pp. 88–99, Sep. 2018.
- [5] X. Chen, D. W. K. Ng, W. Yu, E. G. Larsson, N. Al-Dhahir, and R. Schober, “Massive access for 5G and beyond,” IEEE J. Sel. Areas Commun., vol. 39, no. 3, pp. 615–637, Mar. 2021.
- [6] Y. Liu, S. Zhang, X. Mu, Z. Ding, R. Schober, N. Al-Dhahir, E. Hossain, and X. Shen, “Evolution of NOMA toward next generation multiple access (NGMA) for 6G,” IEEE J. Sel. Areas Commun., vol. 40, no. 4, pp. 1037–1071, Apr. 2022.
- [7] L. Liu and W. Yu, “Massive connectivity with massive MIMO—part I: Device activity detection and channel estimation,” IEEE Trans. Signal Process., vol. 66, no. 11, pp. 2933–2946, Jun. 2018.
- [8] K. Ying, Z. Gao, S. Chen, M. Zhou, D. Zheng, S. Chatzinotas, B. Ottersten, and H. V. Poor, “Quasi-synchronous random access for massive MIMO-based LEO satellite constellations,” IEEE J. Sel. Areas Commun., vol. 41, no. 6, pp. 1702–1722, Jun. 2023.
- [9] W. Chen, H. Xiao, L. Sun, and B. Ai, “Joint activity detection and channel estimation in massive MIMO systems with angular domain enhancement,” IEEE Trans. Wireless Commun., vol. 21, no. 5, pp. 2999–3011, May 2022.
- [10] M. Ke, Z. Gao, Y. Wu, X. Gao, and R. Schober, “Compressive sensing-based adaptive active user detection and channel estimation: Massive access meets massive MIMO,” IEEE Trans. Signal Process., vol. 68, pp. 764–779, 2020.
- [11] Y. Wang, Z. Gao, D. Zheng, S. Chen, D. Gündüz, and H. V. Poor, “Transformer-empowered 6G intelligent networks: From massive MIMO processing to semantic communication,” IEEE Wireless Commun., vol. 30, no. 6, pp. 127–135, Dec. 2023.
- [12] G. Sun, Y. Li, X. Yi, W. Wang, X. Gao, L. Wang, F. Wei, and Y. Chen, “Massive grant-free OFDMA with timing and frequency offsets,” IEEE Trans. Wireless Commun., vol. 21, no. 5, pp. 3365–3380, May 2022.
- [13] Y. Zhu, G. Sun, W. Wang, L. You, F. Wei, L. Wang, and Y. Chen, “OFDM-based massive grant-free transmission over frequency-selective fading channels,” IEEE Trans. Commun., vol. 70, no. 7, pp. 4543–4558, Jul. 2022.
- [14] S. Jiang, X. Yuan, X. Wang, C. Xu, and W. Yu, “Joint user identification, channel estimation, and signal detection for grant-free NOMA,” IEEE Trans. Wireless Commun., vol. 19, no. 10, pp. 6960–6976, Oct. 2020.
- [15] Y. Polyanskiy, “A perspective on massive random-access,” in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Aachen, Germany, Aug. 2017, pp. 2523–2527.
- [16] O. Ordentlich and Y. Polyanskiy, “Low complexity schemes for the random access gaussian channel,” in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Aachen, Germany, Aug. 2017, pp. 2528–2532.
- [17] V. K. Amalladinne, J.-F. Chamberland, and K. R. Narayanan, “A coded compressed sensing scheme for unsourced multiple access,” IEEE Trans. Inf. Theory, vol. 66, no. 10, pp. 6509–6533, Oct. 2020.
- [18] A. Fengler, P. Jung, and G. Caire, “SPARCs and AMP for unsourced random access,” in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Paris, France, Jul. 2019, pp. 2843–2847.
- [19] J. R. Ebert, V. K. Amalladinne, S. Rini, J.-F. Chamberland, and K. R. Narayanan, “Coded demixing for unsourced random access,” IEEE Trans. Signal Process., vol. 70, pp. 2972–2984, 2022.
- [20] X. Xie, Y. Wu, J. An, J. Gao, W. Zhang, C. Xing, K.-K. Wong, and C. Xiao, “Massive unsourced random access: Exploiting angular domain sparsity,” IEEE Trans. Commun., vol. 70, no. 4, pp. 2480–2498, Apr. 2022.
- [21] A. Fengler, S. Haghighatshoar, P. Jung, and G. Caire, “Non-bayesian activity detection, large-scale fading coefficient estimation, and unsourced random access with a massive MIMO receiver,” IEEE Trans. Inf. Theory, vol. 67, no. 5, pp. 2925–2951, May 2021.
- [22] V. K. Amalladinne, A. K. Pradhan, C. Rush, J.-F. Chamberland, and K. R. Narayanan, “Unsourced random access with coded compressed sensing: Integrating AMP and belief propagation,” IEEE Trans. Inf. Theory, vol. 68, no. 4, pp. 2384–2409, Apr. 2022.
- [23] A. K. Pradhan, V. K. Amalladinne, K. R. Narayanan, and J.-F. Chamberland, “Polar coding and random spreading for unsourced multiple access,” in Proc. IEEE Int. Conf. Commun. (ICC), Dublin, Ireland, Jul. 2020, pp. 1–6.
- [24] E. Marshakov, G. Balitskiy, K. Andreev, and A. Frolov, “A polar code based unsourced random access for the gaussian MAC,” in Proc. IEEE 90th Veh. Technol. Conf. (VTC2019-Fall), Honolulu, HI, USA, Sep. 2019, pp. 1–5.
- [25] A. K. Pradhan, V. K. Amalladinne, A. Vem, K. R. Narayanan, and J.-F. Chamberland, “Sparse IDMA: A joint graph-based coding scheme for unsourced random access,” IEEE Trans. Commun., vol. 70, no. 11, pp. 7124–7133, Nov. 2022.
- [26] A. K. Pradhan, V. K. Amalladinne, K. R. Narayanan, and J.-F. Chamberland, “LDPC codes with soft interference cancellation for uncoordinated unsourced multiple access,” in Proc. IEEE Int. Conf. Commun. (ICC), Montreal, QC, Canada, Jun. 2021, pp. 1–6.
- [27] A. Fengler, O. Musa, P. Jung, and G. Caire, “Pilot-based unsourced random access with a massive MIMO receiver, interference cancellation, and power control,” IEEE J. Sel. Areas Commun., vol. 40, no. 5, pp. 1522–1534, May 2022.
- [28] M. Gkagkos, K. R. Narayanan, J.-F. Chamberland, and C. N. Georghiades, “FASURA: A scheme for quasi-static massive MIMO unsourced random access channels,” in Proc. IEEE 23rd Int. Workshop Signal Process. Adv. Wireless Commun. (SPAWC), Oulu, Finland, Jul. 2022, pp. 1–5.
- [29] Z. Han, X. Yuan, C. Xu, S. Jiang, and X. Wang, “Sparse kronecker-product coding for unsourced multiple access,” IEEE Wireless Commun. Lett., vol. 10, no. 10, pp. 2274–2278, Oct. 2021.
- [30] Z. Han, X. Yuan, C. Xu, and X. Wang, “Receiver design for MIMO unsourced random access with sparse kronecker-product coding,” IEEE Wireless Commun. Lett., vol. 12, no. 1, pp. 45–49, Jan. 2023.
- [31] A. Decurninge, I. Land et al., “Tensor-based modulation for unsourced massive random access,” IEEE Wireless Commun. Lett., vol. 10, no. 3, pp. 552–556, Mar. 2021.
- [32] A. Decurninge, I. Land, and M. Guillaud, “Tensor decomposition bounds for TBM-based massive access,” in Proc. IEEE 22nd Int. Workshop Signal Process. Adv. Wireless Commun. (SPAWC), Lucca, Italy, Sep. 2021, pp. 346–350.
- [33] 3GPP, “3GPP TS 38.212 V17.4.0 NR; Multiplexing and channel coding,” 3rd Generation Partnership Project (3GPP), Technical Specification (TS) 38.212, 2022.
- [34] K.-H. Ngo, A. Decurninge, M. Guillaud, and S. Yang, “Cube-split: A structured grassmannian constellation for non-coherent SIMO communications,” IEEE Trans. Wireless Commun., vol. 19, no. 3, pp. 1948–1964, Mar. 2020.
- [35] L. Sorber, M. Van Barel, and L. De Lathauwer, “Optimization-based algorithms for tensor decompositions: Canonical polyadic decomposition, decomposition in rank- terms, and a new generalization,” SIAM J. Optim., vol. 23, no. 2, pp. 695–720, Apr. 2013.
- [36] N. D. Sidiropoulos, L. De Lathauwer, X. Fu, K. Huang, E. E. Papalexakis, and C. Faloutsos, “Tensor decomposition for signal processing and machine learning,” IEEE Trans. Signal Process., vol. 65, no. 13, pp. 3551–3582, Jul. 2017.
- [37] C. Zhang, J. Bütepage, H. Kjellström, and S. Mandt, “Advances in variational inference,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 41, no. 8, pp. 2008–2026, Aug. 2019.
- [38] D. G. Tzikas, A. C. Likas, and N. P. Galatsanos, “The variational approximation for bayesian inference,” IEEE Signal Process. Mag., vol. 25, no. 6, pp. 131–146, Nov. 2008.
- [39] A. Balatsoukas-Stimming, M. B. Parizi, and A. Burg, “LLR-based successive cancellation list decoding of polar codes,” IEEE Trans. Signal Process., vol. 63, no. 19, pp. 5165–5179, Oct. 2015.
- [40] K. Niu and K. Chen, “CRC-aided decoding of polar codes,” IEEE Commun. Lett., vol. 16, no. 10, pp. 1668–1671, Oct. 2012.
- [41] Q. Zhao, L. Zhang, and A. Cichocki, “Bayesian CP factorization of incomplete tensors with automatic rank determination,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 37, no. 9, pp. 1751–1763, Sep. 2015.
- [42] L. Cheng, Z. Chen, Q. Shi, Y.-C. Wu, and S. Theodoridis, “Towards flexible sparsity-aware modeling: Automatic tensor rank learning using the generalized hyperbolic prior,” IEEE Trans. Signal Process., vol. 70, pp. 1834–1849, 2022.
- [43] M. J. Wainwright and M. I. Jordan, “Graphical models, exponential families, and variational inference,” Found. Trends Mach. Learn., vol. 1, no. 1–2, p. 1–305, Jan. 2008.
- [44] L. Chiantini, G. Ottaviani, and N. Vannieuwenhoven, “An algorithm for generic and low-rank specific identifiability of complex tensors,” SIAM J. Matrix Anal. Appl., vol. 35, no. 4, pp. 1265–1287, Mar. 2014.
- [45] L. Chiantini and G. Ottaviani, “On generic identifiability of 3-tensors of small rank,” SIAM J. Matrix Anal. Appl., vol. 33, no. 3, pp. 1018–1037, Mar. 2012.